[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2017/dsa-379{5,4}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2017/dsa-3794.wml	2017-02-26 10:00:26.000000000 +0500
+++ russian/security/2017/dsa-3794.wml	2017-02-26 10:42:15.056246165 +0500
@@ -1,15 +1,16 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.2" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>Stevie Trujillo discovered a local file write vulnerability in munin, a
- -network-wide graphing framework, when CGI graphs are enabled. GET
- -parameters are not properly handled, allowing to inject options into
- -munin-cgi-graph and overwriting any file accessible accessible by the
- -user running the cgi-process.</p>
+<p>СÑ?иви ТÑ?Ñ?илло обнаÑ?Ñ?жил Ñ?Ñ?звимоÑ?Ñ?Ñ? локалÑ?нÑ?Ñ? Ñ?айлов в munin,
+инÑ?Ñ?аÑ?Ñ?Ñ?Ñ?кÑ?Ñ?Ñ?е поÑ?Ñ?Ñ?оениÑ? гÑ?аÑ?иков в Ñ?еÑ?и, коÑ?оÑ?аÑ? пÑ?оÑ?влÑ?еÑ?Ñ?Ñ? пÑ?и Ñ?Ñ?ловии
+вклÑ?Ñ?ениÑ? гÑ?аÑ?иков CGI. Ð?аÑ?амеÑ?Ñ?Ñ? GET обÑ?абаÑ?Ñ?ваÑ?Ñ?Ñ?Ñ? непÑ?авилÑ?но, Ñ?Ñ?о позволÑ?еÑ?
+вводиÑ?Ñ? опÑ?ии в munin-cgi-graph и пеÑ?езапиÑ?Ñ?ваÑ?Ñ? лÑ?бой Ñ?айл, доÑ?Ñ?Ñ?пнÑ?
+полÑ?зоваÑ?елÑ?, запÑ?Ñ?Ñ?ивÑ?емÑ? cgi-пÑ?оÑ?еÑ?Ñ?.</p>
 
- -<p>For the stable distribution (jessie), this problem has been fixed in
- -version 2.0.25-1+deb8u1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 2.0.25-1+deb8u1.</p>
 
- -<p>We recommend that you upgrade your munin packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? munin.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2017/dsa-3795.wml	2017-02-26 10:02:08.000000000 +0500
+++ russian/security/2017/dsa-3795.wml	2017-02-26 10:06:30.629175510 +0500
@@ -1,22 +1,23 @@
- -<define-tag description>security update</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>обновление безопаÑ?ноÑ?Ñ?и</define-tag>
 <define-tag moreinfo>
- -<p>It was discovered that a maliciously crafted query can cause ISC's
- -BIND DNS server (named) to crash if both Response Policy Zones (RPZ)
- -and DNS64 (a bridge between IPv4 and IPv6 networks) are enabled.  It
- -is uncommon for both of these options to be used in combination, so
- -very few systems will be affected by this problem in practice.</p>
+<p>Ð?Ñ?ло обнаÑ?Ñ?жено, Ñ?Ñ?о Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?й запÑ?оÑ? можеÑ? пÑ?иводиÑ?Ñ? к аваÑ?ийной
+оÑ?Ñ?ановке DNS-Ñ?еÑ?веÑ?а BIND оÑ? ISC (named) в Ñ?лÑ?Ñ?ае, еÑ?ли вклÑ?Ñ?енÑ? опÑ?ии Response
+Policy Zones (RPZ) и DNS64 (моÑ?Ñ? междÑ? Ñ?еÑ?Ñ?ми IPv4 и IPv6). ЭÑ?и опÑ?ии
+кÑ?айне Ñ?едко иÑ?полÑ?зÑ?Ñ?Ñ?Ñ?Ñ? одновÑ?еменно, поÑ?Ñ?омÑ? данной пÑ?облеме на пÑ?акÑ?ике
+подвеÑ?жено лиÑ?Ñ? малое Ñ?иÑ?ло Ñ?иÑ?Ñ?ем.</p>
 
- -<p>This update also corrects an additional regression caused by the fix
- -for <a href="https://security-tracker.debian.org/tracker/CVE-2016-8864";>CVE-2016-8864</a>,
- -which was applied in a previous security update.</p>
+<p>Ð?Ñ?оме Ñ?ого, данное обновление иÑ?пÑ?авлÑ?еÑ? Ñ?егÑ?еÑ?Ñ?иÑ?, вÑ?званнÑ?Ñ? иÑ?пÑ?авлением
+<a href="https://security-tracker.debian.org/tracker/CVE-2016-8864";>CVE-2016-8864</a>,
+коÑ?оÑ?ое бÑ?ло пÑ?именено в пÑ?едÑ?дÑ?Ñ?ем обновлении безопаÑ?ноÑ?Ñ?и.</p>
 
- -<p>For the stable distribution (jessie), this problem has been fixed in
- -version 1:9.9.5.dfsg-9+deb8u10.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (jessie) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1:9.9.5.dfsg-9+deb8u10.</p>
 
- -<p>For the testing (stretch) and unstable (sid) distributions, this
- -problem has been fixed in version 1:9.10.3.dfsg.P4-12.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (stretch) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ? Ñ?Ñ?а
+пÑ?облема бÑ?ла иÑ?пÑ?авлена в веÑ?Ñ?ии 1:9.10.3.dfsg.P4-12.</p>
 
- -<p>We recommend that you upgrade your bind9 packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? bind9.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=mivq
-----END PGP SIGNATURE-----


Reply to: